SlideShare a Scribd company logo
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
256
Type –Reduction Method on Fuzzy Critical Path
P.Balasowandari1
and Dr. V.Anusuya2
1
Research Scholar, PG and Research Department of Mathematics,
Seethalakshmi Ramaswami college, Tiruchirapalli-2
2
Associate Professor, PG and Research Department of Mathematics,
Seethalakshmi Ramaswami college, Tiruchirapalli-2
Email: balasowandari@gmail.com anusrctry@gmail.com
Abstract- In this paper, we propose a new method to find the fuzzy critical path in a acyclic project network
using type reduction method. Type-2 discrete fuzzy numbers and its complement are used to identify the fuzzy
critical path. An illustrative example is also included to demonstrate our proposed method.
Keywords: Fuzzy critical path, type-2 discrete fuzzy number, acyclic project network, centre of gravity.
1. INTRODUCTION [8],[10],[11]
Critical path method is a network-based
method that provides assistance in planning and
controlling complicated projects in real world
applications. The objective of the critical path
method(CPM) is to locate critical activities on the
critical path so that resources may be concentrated
on these activities in order to shorten the project
length time. CPM enables the decision maker adopt
a better strategy of optimizing the time and the
available resources to ensure the speedy
completion and the standard of the project.
This paper analyzes the critical path in a
general project network with fuzzy activity times.
Several type-reduction methods for type-2 fuzzy
sets have been proposed. Coupland and john[4]
proposed a type reduction method for type-2 fuzzy
sets. We propound centre of gravity under type
reduction method for fuzzy numbers to find a fuzzy
critical path. The time span of each activity in a
fuzzy project network is represented by type – 2
discrete fuzzy number.
The organization of the paper is as
follows: In section 2 some basic concepts are
discussed. section 3 gives some properties of total
slack fuzzy time. Section 4 gives the network
terminology. An algorithm to find the fuzzy critical
path is discussed in section 5.The proposed
algorithm is illustrated through a numerical
example in section 6.
2. BASIC CONCEPTS
2.1. Type-2 discrete fuzzy number [1],[2]
Let X be a non-empty finite set, which is referred as the universal set. A type-2 fuzzy set A
~
, is
characterized by a type-2 membership function IIXuxA
:),(~ ]1,0[,  IXxwhere
 ),/),();,((
~
~ IJuXxuxuxAisthatIJuand xAx   where 1),(0 ~  uxA

A
~
can also be expressed as IJ
x
uuP
ux
ux
A x
Ux
x
Xx Ju
A
x
    
/)(
),(
),(~ ~
, where  denotes union
all admissible x and u. For, discrete  universe of discourse is replaced by  .
2.2.Complement of type-2 discrete fuzzy number
The complement of the type-2 fuzzy set houses a fuzzy membership function given in the following
formula:


















Xx
Ju
x
x
u
uf
A
x
)1(
)(
~
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
257
2.3 Centroid measure [9]
If A
~
is a type-2 fuzzy set in the discrete case, the centroid of A
~
can be defined as follows:







R
j
jA
R
j
jAj
Rxxx
JJJ
A
x
xx
fff
C
R
RxRxx
1
1
11
~
)(
)(
)]()....().([..... 21
2211




Where



















R
j j
Ju
x
x
u
uf
A
jx
j
1
)(
~
2.4 centre of gravity
The centre of gravity of a fuzzy set A
~
is represented as




 R
i
iA
R
i
iAi
x
xx
Af
1
1
)(
)(
)
~
(


where 

R
i
iiA xxA
1
)(
~

2.5. Notations:
tij= The activity between node i and j.
j
ESF =The earliest starting fuzzy time of node j.
i
LFF = The latest finishing fuzzy time of node i.
ijTSF = The total slack fuzzy time of tij.
pn= the nth
fuzzy path.
P = the set of all fuzzy paths in a project network
F(pn)= The total slack fuzzy time of path pn in a
project network.
3. PROPERTIES [5],[6],[7]
Property :3.1 (Forward pass calculation)
To calculate the earliest starting fuzzy time in
the project network, set the initial node to zero for
starting (ie) )0.0,0.0,0.0,0.0(1
ESF
,,},{max NjijTSFESFESF ijjij

i=number of preceding nodes.( j
ESF =The earliest
starting fuzzy time of node j).
Ranking value is utilized to identify the maximum
value.
Earliest finishing fuzzy time = Earliest starting
fuzzy time (+) Fuzzy activity time.
Property 3.2. (Backward pass calculation)
To calculate the latest finishing time in the project
network set ESFnLFFn
 .
,,},)({min NiniSETLFFLFF ijjjj

j = number of succeeding nodes. Ranking value is
utilized to identify the minimum value.
Latest starting fuzzy time= Latest finishing Fuzzy
time (-) Fuzzy activity time.
Property 3.3.
For the activity tij, i<j
Total fuzzy slack:
))()(( ijijij
SFTESFLFFSFT  (or)
,))()(( iijj
ESFSFTLFF  ;1 nji 
,, Nji 
Property 3.4.
1
,
( )n ij
i j n
i j pk
F p SFT
  

  , ,Ppk  np denotes
the number of possible paths in a network from
source node to the destination node, k=1 to m.
4. NETWORK TERMINOLOGY
A directed acyclic project network consisting
of six nodes and seven edges are considered. Each
edge in this network is assigned by type-2 discrete
fuzzy numbers. Then the set of all possible paths
are denoted by P. The fuzzy critical path is
identified from P.
5. Algorithm (for finding critical path) [3]
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
258
Step 1: Estimate the fuzzy activity time with
respect to each activity.
Step 2: Let )0.0,0.0,0.0,0.0(1
ESF and
calculate jESF , j =2,3,…. n by using
property 1.
Step 3: Let nn ESFLFF  and calculate iLFF
,i=n-1, n-2,….. 2,1. By using property 2.
Step 4: Calculate ijSFT with respect to each
activity in a project network by using
property 3.
Step 5 : Calculate centre of gravity for each
activity using definition 2.4.
Step 6 : If total float =0 (using centre of gravity),
the corresponding path is a fuzzy critical path.
6. NUMERICAL EXAMPLE
The problem is to find the fuzzy critical path in a
acyclic project network whose edges are assigned
with type-2 discrete fuzzy numbers.
Solution :
The edge lengths are
    29.06.035.0/6.06.07.0
~
A
  3/)3.0/4.0(26.07.07.05.0
~
B
    47.06.08.07.037.09.0
~
C
  34.08.0
~
D
    47.03.038.06.08.07.0
~
E
  27.02.08.07.0
~
F
    45.06.04.03.035.05.0
~
G
Complement of edge lengths are
    21.06.035.0/6.04.07.0
~
A
  3/)7.0/4.0(24.07.03.05.0
~
B
    43.06.02.07.033.09.0
~
C
  36.08.0
~
D
    43.03.032.06.02.07.0
~
E
  23.02.02.07.0
~
F
    45.06.06.03.035.05.0
~
G
C
~
F
~
D
~
G
~
E
~
Fig .6.1 Acyclic project network
Activities, fuzzy durations and total slack time for each activity for type-2 discrete fuzzy number and its
complement are given in the table 6.1 and table 6.2.
Table: 6.1
Activity
(i-j)i<j
Fuzzy activity time Total float
1-2     29.06.035.0/6.06.07.0  1.4
1
2
3 5
4
6
A
~
B
~
International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
259
1-3   3/)3.0/4.0(26.07.07.05.0  0
2-4     47.06.08.07.037.09.0  1.4
3-4   34.08.0 2.0
3-5     47.03.038.06.08.07.0  0
4-6   27.02.08.07.0  1.4
5-6     45.06.04.03.035.05.0  0
Table: 6.2
Activity
(i-j)i<j
Fuzzy activity time Total float
1-2     21.06.035.0/6.04.07.0  1.55
1-3   3/)7.0/4.0(24.07.03.05.0  0
2-4     43.06.02.07.033.09.0  1.55
3-4   36.08.0 2.1
3-5     43.03.032.06.02.07.0  0
4-6   23.02.02.07.0  1.55
5-6     45.06.06.03.035.05.0  0
The path 1-3-5-6 is identified as a fuzzy critical path by type reduction method from the possible
paths P = {(1-2-4-6),(1-3-5-6),(1-3-4-6)}
5. CONCLUSION
In this paper, we have proposed type reduction
process to identify fuzzy critical path in a acyclic
project network using type-2 discrete fuzzy
numbers and its complement. The same fuzzy
critical path is obtained in both cases.
REFERENCES
[1] Anusuya V and.Sathya R, (2014) Fuzzy
shortest path by Type reduction International
Journal of Fuzzy Mathematical Archive,
vol. 4,pp.11-18.
[2] Anusuya V and Balasowandari P ,(Feb-
016)Fuzzy critical path with type-2 trapezoidal
fuzzynumbers, National conference on Graph
Theory, Fuzzy Graph Theory, and their
applications, Jamal Academic Research
Journal: An interdisciplinary Special Issue,
pp.171-176.
[3] Chanas S and Zielinski , (2001) Critical path
analysis in the network with fuzzy activity
times, Fuzzy Sets and Systems, vol.122,pp.
195-204.
[4] Coupland S and John R , (2008) “ A fast
geometric methods for defuzzification of type-
2 fuzzy sets,” IEEE Int. Conf. Fuzzy
systems ., Vol.16,no.4,pp.924-941..
[5] Elizabeth S. and Sujatha L, (2013),Fuzzy
critical path problem for project network,
International journal of pure and applied
mathematics , vol. 85,pp. 223-240.
[6] Liang G.S and Chenhan T, (2004) Fuzzy
critical path project network, Information and
Management sciences, Vol. 15,pp. 29-40.
[7] Nasution S.H, (1994)Fuzzy critical path method,
IEEE Trans. System Man Cybernetics, vol. 24,pp.
48-57.
[8] O’Brien J.J, 1993,CPM in Construction
Management, New York, Mc-Graw-Hill,.
[9] Sugeno,M,. 1977 “Fuzzy measures and fuzzy
integrals-a survey”, In Gupta, saridis and Gaines,
,pp.89-102.
[10]Zadeh L.A., (1965) Fuzzy sets, Information
and Control, vol.8, ,pp.138-353.
[11]Zadeh L.A., (1975), (1976)The concepts of a
linguistic variable and its application to
approximate reasoning part 1, 2, 3,
Information Sciences, vol.8, 199-249;vol. 9,pp.
43-58.

More Related Content

What's hot

LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
Fransiskeran
 
Icmtea
IcmteaIcmtea
Spacey random walks from Householder Symposium XX 2017
Spacey random walks from Householder Symposium XX 2017Spacey random walks from Householder Symposium XX 2017
Spacey random walks from Householder Symposium XX 2017
Austin Benson
 
Radix-3 Algorithm for Realization of Discrete Fourier Transform
Radix-3 Algorithm for Realization of Discrete Fourier TransformRadix-3 Algorithm for Realization of Discrete Fourier Transform
Radix-3 Algorithm for Realization of Discrete Fourier Transform
IJERA Editor
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
iaemedu
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
IAEME Publication
 
[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li
[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li
[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li
IJET - International Journal of Engineering and Techniques
 
Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIFast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
ijeei-iaes
 
A new non symmetric information divergence of
A new non symmetric information divergence ofA new non symmetric information divergence of
A new non symmetric information divergence of
eSAT Publishing House
 
Fuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering AlgorithmsFuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering Algorithms
Justin Cletus
 
Rough K Means - Numerical Example
Rough K Means - Numerical ExampleRough K Means - Numerical Example
Rough K Means - Numerical Example
Dr.E.N.Sathishkumar
 
PaperNo21-habibi-IJMTT-V8P514-IJMMT
PaperNo21-habibi-IJMTT-V8P514-IJMMTPaperNo21-habibi-IJMTT-V8P514-IJMMT
PaperNo21-habibi-IJMTT-V8P514-IJMMT
Mezban Habibi
 
A Numerical Solution for Sine Gordon Type System
A Numerical Solution for Sine Gordon Type SystemA Numerical Solution for Sine Gordon Type System
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
D044042432
D044042432D044042432
D044042432
IJERA Editor
 
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
TELKOMNIKA JOURNAL
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial Flow
Sylvain_Lobry
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficients
Austin Benson
 
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
csandit
 
On Certain Special Vector Fields in a Finsler Space III
On Certain Special Vector Fields in a Finsler Space IIIOn Certain Special Vector Fields in a Finsler Space III
On Certain Special Vector Fields in a Finsler Space III
BRNSS Publication Hub
 

What's hot (20)

LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULLADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFUL
 
Icmtea
IcmteaIcmtea
Icmtea
 
Spacey random walks from Householder Symposium XX 2017
Spacey random walks from Householder Symposium XX 2017Spacey random walks from Householder Symposium XX 2017
Spacey random walks from Householder Symposium XX 2017
 
Radix-3 Algorithm for Realization of Discrete Fourier Transform
Radix-3 Algorithm for Realization of Discrete Fourier TransformRadix-3 Algorithm for Realization of Discrete Fourier Transform
Radix-3 Algorithm for Realization of Discrete Fourier Transform
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
 
[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li
[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li
[IJCT-V3I2P19] Authors: Jieyin Mai, Xiaojun Li
 
Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIFast Algorithm for Computing the Discrete Hartley Transform of Type-II
Fast Algorithm for Computing the Discrete Hartley Transform of Type-II
 
A new non symmetric information divergence of
A new non symmetric information divergence ofA new non symmetric information divergence of
A new non symmetric information divergence of
 
Fuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering AlgorithmsFuzzy c-Means Clustering Algorithms
Fuzzy c-Means Clustering Algorithms
 
Rough K Means - Numerical Example
Rough K Means - Numerical ExampleRough K Means - Numerical Example
Rough K Means - Numerical Example
 
PaperNo21-habibi-IJMTT-V8P514-IJMMT
PaperNo21-habibi-IJMTT-V8P514-IJMMTPaperNo21-habibi-IJMTT-V8P514-IJMMT
PaperNo21-habibi-IJMTT-V8P514-IJMMT
 
A Numerical Solution for Sine Gordon Type System
A Numerical Solution for Sine Gordon Type SystemA Numerical Solution for Sine Gordon Type System
A Numerical Solution for Sine Gordon Type System
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
D044042432
D044042432D044042432
D044042432
 
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial Flow
 
Higher-order clustering coefficients
Higher-order clustering coefficientsHigher-order clustering coefficients
Higher-order clustering coefficients
 
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
NEW NON-COPRIME CONJUGATE-PAIR BINARY TO RNS MULTI-MODULI FOR RESIDUE NUMBER ...
 
On Certain Special Vector Fields in a Finsler Space III
On Certain Special Vector Fields in a Finsler Space IIIOn Certain Special Vector Fields in a Finsler Space III
On Certain Special Vector Fields in a Finsler Space III
 

Similar to Paper id 71201925

A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
Wireilla
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
ijfls
 
J045055560
J045055560J045055560
J045055560
IJERA Editor
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
eSAT Publishing House
 
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
ijcsit
 
Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curves
eSAT Journals
 
Dijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationDijkstra Shortest Path Visualization
Dijkstra Shortest Path Visualization
IRJET Journal
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routing
eSAT Publishing House
 
A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...
eSAT Journals
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
CSCJournals
 
Paper id 21201488
Paper id 21201488Paper id 21201488
Paper id 21201488
IJRAT
 
Efficient Design of Reversible Multiplexers with Low Quantum Cost
Efficient Design of Reversible Multiplexers with Low Quantum CostEfficient Design of Reversible Multiplexers with Low Quantum Cost
Efficient Design of Reversible Multiplexers with Low Quantum Cost
IJERA Editor
 
A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve the
IJCNCJournal
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
IJERA Editor
 
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
VIT-AP University
 
Node Path Visualizer Using Shortest Path Algorithms
Node Path Visualizer Using Shortest Path AlgorithmsNode Path Visualizer Using Shortest Path Algorithms
Node Path Visualizer Using Shortest Path Algorithms
IRJET Journal
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
CSCJournals
 
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
AM Publications,India
 
Steiner Tree: approach applying for shortest path in selected network
Steiner Tree: approach applying for shortest path in selected networkSteiner Tree: approach applying for shortest path in selected network
Steiner Tree: approach applying for shortest path in selected network
IOSR Journals
 

Similar to Paper id 71201925 (20)

A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
A COUNTEREXAMPLE TO THE FORWARD RECURSION IN FUZZY CRITICAL PATH ANALYSIS UND...
 
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
A Counterexample to the Forward Recursion in Fuzzy Critical Path Analysis Und...
 
J045055560
J045055560J045055560
J045055560
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDE...
 
Fault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curvesFault diagnosis using genetic algorithms and principal curves
Fault diagnosis using genetic algorithms and principal curves
 
Dijkstra Shortest Path Visualization
Dijkstra Shortest Path VisualizationDijkstra Shortest Path Visualization
Dijkstra Shortest Path Visualization
 
A novel scheme for reliable multipath routing
A novel scheme for reliable multipath routingA novel scheme for reliable multipath routing
A novel scheme for reliable multipath routing
 
A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...A novel scheme for reliable multipath routing through node independent direct...
A novel scheme for reliable multipath routing through node independent direct...
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
 
Paper id 21201488
Paper id 21201488Paper id 21201488
Paper id 21201488
 
Efficient Design of Reversible Multiplexers with Low Quantum Cost
Efficient Design of Reversible Multiplexers with Low Quantum CostEfficient Design of Reversible Multiplexers with Low Quantum Cost
Efficient Design of Reversible Multiplexers with Low Quantum Cost
 
A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve the
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
Low Power 32×32 bit Multiplier Architecture based on Vedic Mathematics Using ...
 
Node Path Visualizer Using Shortest Path Algorithms
Node Path Visualizer Using Shortest Path AlgorithmsNode Path Visualizer Using Shortest Path Algorithms
Node Path Visualizer Using Shortest Path Algorithms
 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
 
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
Evolution of regenerative Ca-ion wave-packet in Neuronal-firing Fields: Quant...
 
Steiner Tree: approach applying for shortest path in selected network
Steiner Tree: approach applying for shortest path in selected networkSteiner Tree: approach applying for shortest path in selected network
Steiner Tree: approach applying for shortest path in selected network
 

More from IJRAT

96202108
9620210896202108
96202108
IJRAT
 
97202107
9720210797202107
97202107
IJRAT
 
93202101
9320210193202101
93202101
IJRAT
 
92202102
9220210292202102
92202102
IJRAT
 
91202104
9120210491202104
91202104
IJRAT
 
87202003
8720200387202003
87202003
IJRAT
 
87202001
8720200187202001
87202001
IJRAT
 
86202013
8620201386202013
86202013
IJRAT
 
86202008
8620200886202008
86202008
IJRAT
 
86202005
8620200586202005
86202005
IJRAT
 
86202004
8620200486202004
86202004
IJRAT
 
85202026
8520202685202026
85202026
IJRAT
 
711201940
711201940711201940
711201940
IJRAT
 
711201939
711201939711201939
711201939
IJRAT
 
711201935
711201935711201935
711201935
IJRAT
 
711201927
711201927711201927
711201927
IJRAT
 
711201905
711201905711201905
711201905
IJRAT
 
710201947
710201947710201947
710201947
IJRAT
 
712201907
712201907712201907
712201907
IJRAT
 
712201903
712201903712201903
712201903
IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
um7474492
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 

Recently uploaded (20)

Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...smart pill dispenser is designed to improve medication adherence and safety f...
smart pill dispenser is designed to improve medication adherence and safety f...
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 

Paper id 71201925

  • 1. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 256 Type –Reduction Method on Fuzzy Critical Path P.Balasowandari1 and Dr. V.Anusuya2 1 Research Scholar, PG and Research Department of Mathematics, Seethalakshmi Ramaswami college, Tiruchirapalli-2 2 Associate Professor, PG and Research Department of Mathematics, Seethalakshmi Ramaswami college, Tiruchirapalli-2 Email: balasowandari@gmail.com anusrctry@gmail.com Abstract- In this paper, we propose a new method to find the fuzzy critical path in a acyclic project network using type reduction method. Type-2 discrete fuzzy numbers and its complement are used to identify the fuzzy critical path. An illustrative example is also included to demonstrate our proposed method. Keywords: Fuzzy critical path, type-2 discrete fuzzy number, acyclic project network, centre of gravity. 1. INTRODUCTION [8],[10],[11] Critical path method is a network-based method that provides assistance in planning and controlling complicated projects in real world applications. The objective of the critical path method(CPM) is to locate critical activities on the critical path so that resources may be concentrated on these activities in order to shorten the project length time. CPM enables the decision maker adopt a better strategy of optimizing the time and the available resources to ensure the speedy completion and the standard of the project. This paper analyzes the critical path in a general project network with fuzzy activity times. Several type-reduction methods for type-2 fuzzy sets have been proposed. Coupland and john[4] proposed a type reduction method for type-2 fuzzy sets. We propound centre of gravity under type reduction method for fuzzy numbers to find a fuzzy critical path. The time span of each activity in a fuzzy project network is represented by type – 2 discrete fuzzy number. The organization of the paper is as follows: In section 2 some basic concepts are discussed. section 3 gives some properties of total slack fuzzy time. Section 4 gives the network terminology. An algorithm to find the fuzzy critical path is discussed in section 5.The proposed algorithm is illustrated through a numerical example in section 6. 2. BASIC CONCEPTS 2.1. Type-2 discrete fuzzy number [1],[2] Let X be a non-empty finite set, which is referred as the universal set. A type-2 fuzzy set A ~ , is characterized by a type-2 membership function IIXuxA :),(~ ]1,0[,  IXxwhere  ),/),();,(( ~ ~ IJuXxuxuxAisthatIJuand xAx   where 1),(0 ~  uxA  A ~ can also be expressed as IJ x uuP ux ux A x Ux x Xx Ju A x      /)( ),( ),(~ ~ , where  denotes union all admissible x and u. For, discrete  universe of discourse is replaced by  . 2.2.Complement of type-2 discrete fuzzy number The complement of the type-2 fuzzy set houses a fuzzy membership function given in the following formula:                   Xx Ju x x u uf A x )1( )( ~
  • 2. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 257 2.3 Centroid measure [9] If A ~ is a type-2 fuzzy set in the discrete case, the centroid of A ~ can be defined as follows:        R j jA R j jAj Rxxx JJJ A x xx fff C R RxRxx 1 1 11 ~ )( )( )]()....().([..... 21 2211     Where                    R j j Ju x x u uf A jx j 1 )( ~ 2.4 centre of gravity The centre of gravity of a fuzzy set A ~ is represented as      R i iA R i iAi x xx Af 1 1 )( )( ) ~ (   where   R i iiA xxA 1 )( ~  2.5. Notations: tij= The activity between node i and j. j ESF =The earliest starting fuzzy time of node j. i LFF = The latest finishing fuzzy time of node i. ijTSF = The total slack fuzzy time of tij. pn= the nth fuzzy path. P = the set of all fuzzy paths in a project network F(pn)= The total slack fuzzy time of path pn in a project network. 3. PROPERTIES [5],[6],[7] Property :3.1 (Forward pass calculation) To calculate the earliest starting fuzzy time in the project network, set the initial node to zero for starting (ie) )0.0,0.0,0.0,0.0(1 ESF ,,},{max NjijTSFESFESF ijjij  i=number of preceding nodes.( j ESF =The earliest starting fuzzy time of node j). Ranking value is utilized to identify the maximum value. Earliest finishing fuzzy time = Earliest starting fuzzy time (+) Fuzzy activity time. Property 3.2. (Backward pass calculation) To calculate the latest finishing time in the project network set ESFnLFFn  . ,,},)({min NiniSETLFFLFF ijjjj  j = number of succeeding nodes. Ranking value is utilized to identify the minimum value. Latest starting fuzzy time= Latest finishing Fuzzy time (-) Fuzzy activity time. Property 3.3. For the activity tij, i<j Total fuzzy slack: ))()(( ijijij SFTESFLFFSFT  (or) ,))()(( iijj ESFSFTLFF  ;1 nji  ,, Nji  Property 3.4. 1 , ( )n ij i j n i j pk F p SFT       , ,Ppk  np denotes the number of possible paths in a network from source node to the destination node, k=1 to m. 4. NETWORK TERMINOLOGY A directed acyclic project network consisting of six nodes and seven edges are considered. Each edge in this network is assigned by type-2 discrete fuzzy numbers. Then the set of all possible paths are denoted by P. The fuzzy critical path is identified from P. 5. Algorithm (for finding critical path) [3]
  • 3. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 258 Step 1: Estimate the fuzzy activity time with respect to each activity. Step 2: Let )0.0,0.0,0.0,0.0(1 ESF and calculate jESF , j =2,3,…. n by using property 1. Step 3: Let nn ESFLFF  and calculate iLFF ,i=n-1, n-2,….. 2,1. By using property 2. Step 4: Calculate ijSFT with respect to each activity in a project network by using property 3. Step 5 : Calculate centre of gravity for each activity using definition 2.4. Step 6 : If total float =0 (using centre of gravity), the corresponding path is a fuzzy critical path. 6. NUMERICAL EXAMPLE The problem is to find the fuzzy critical path in a acyclic project network whose edges are assigned with type-2 discrete fuzzy numbers. Solution : The edge lengths are     29.06.035.0/6.06.07.0 ~ A   3/)3.0/4.0(26.07.07.05.0 ~ B     47.06.08.07.037.09.0 ~ C   34.08.0 ~ D     47.03.038.06.08.07.0 ~ E   27.02.08.07.0 ~ F     45.06.04.03.035.05.0 ~ G Complement of edge lengths are     21.06.035.0/6.04.07.0 ~ A   3/)7.0/4.0(24.07.03.05.0 ~ B     43.06.02.07.033.09.0 ~ C   36.08.0 ~ D     43.03.032.06.02.07.0 ~ E   23.02.02.07.0 ~ F     45.06.06.03.035.05.0 ~ G C ~ F ~ D ~ G ~ E ~ Fig .6.1 Acyclic project network Activities, fuzzy durations and total slack time for each activity for type-2 discrete fuzzy number and its complement are given in the table 6.1 and table 6.2. Table: 6.1 Activity (i-j)i<j Fuzzy activity time Total float 1-2     29.06.035.0/6.06.07.0  1.4 1 2 3 5 4 6 A ~ B ~
  • 4. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019 E-ISSN: 2321-9637 Available online at www.ijrat.org 259 1-3   3/)3.0/4.0(26.07.07.05.0  0 2-4     47.06.08.07.037.09.0  1.4 3-4   34.08.0 2.0 3-5     47.03.038.06.08.07.0  0 4-6   27.02.08.07.0  1.4 5-6     45.06.04.03.035.05.0  0 Table: 6.2 Activity (i-j)i<j Fuzzy activity time Total float 1-2     21.06.035.0/6.04.07.0  1.55 1-3   3/)7.0/4.0(24.07.03.05.0  0 2-4     43.06.02.07.033.09.0  1.55 3-4   36.08.0 2.1 3-5     43.03.032.06.02.07.0  0 4-6   23.02.02.07.0  1.55 5-6     45.06.06.03.035.05.0  0 The path 1-3-5-6 is identified as a fuzzy critical path by type reduction method from the possible paths P = {(1-2-4-6),(1-3-5-6),(1-3-4-6)} 5. CONCLUSION In this paper, we have proposed type reduction process to identify fuzzy critical path in a acyclic project network using type-2 discrete fuzzy numbers and its complement. The same fuzzy critical path is obtained in both cases. REFERENCES [1] Anusuya V and.Sathya R, (2014) Fuzzy shortest path by Type reduction International Journal of Fuzzy Mathematical Archive, vol. 4,pp.11-18. [2] Anusuya V and Balasowandari P ,(Feb- 016)Fuzzy critical path with type-2 trapezoidal fuzzynumbers, National conference on Graph Theory, Fuzzy Graph Theory, and their applications, Jamal Academic Research Journal: An interdisciplinary Special Issue, pp.171-176. [3] Chanas S and Zielinski , (2001) Critical path analysis in the network with fuzzy activity times, Fuzzy Sets and Systems, vol.122,pp. 195-204. [4] Coupland S and John R , (2008) “ A fast geometric methods for defuzzification of type- 2 fuzzy sets,” IEEE Int. Conf. Fuzzy systems ., Vol.16,no.4,pp.924-941.. [5] Elizabeth S. and Sujatha L, (2013),Fuzzy critical path problem for project network, International journal of pure and applied mathematics , vol. 85,pp. 223-240. [6] Liang G.S and Chenhan T, (2004) Fuzzy critical path project network, Information and Management sciences, Vol. 15,pp. 29-40. [7] Nasution S.H, (1994)Fuzzy critical path method, IEEE Trans. System Man Cybernetics, vol. 24,pp. 48-57. [8] O’Brien J.J, 1993,CPM in Construction Management, New York, Mc-Graw-Hill,. [9] Sugeno,M,. 1977 “Fuzzy measures and fuzzy integrals-a survey”, In Gupta, saridis and Gaines, ,pp.89-102. [10]Zadeh L.A., (1965) Fuzzy sets, Information and Control, vol.8, ,pp.138-353. [11]Zadeh L.A., (1975), (1976)The concepts of a linguistic variable and its application to approximate reasoning part 1, 2, 3, Information Sciences, vol.8, 199-249;vol. 9,pp. 43-58.